Mercurial > pidgin
diff src/protocols/yahoo/crypt.c @ 10687:b256ce6b85b8
[gaim-migrate @ 12235]
grim says this is really fixed this time.
committer: Tailor Script <tailor@pidgin.im>
| author | Etan Reisner <pidgin@unreliablesource.net> |
|---|---|
| date | Sat, 12 Mar 2005 01:10:37 +0000 |
| parents | 72a5babfa8b4 |
| children | 923b78741964 |
line wrap: on
line diff
--- a/src/protocols/yahoo/crypt.c Fri Mar 11 22:45:41 2005 +0000 +++ b/src/protocols/yahoo/crypt.c Sat Mar 12 01:10:37 2005 +0000 @@ -49,6 +49,7 @@ size_t salt_len; size_t key_len; size_t cnt; + char *cp; if (buflen < needed) { @@ -100,7 +101,7 @@ gaim_cipher_context_append(context2, key, key_len); /* Now get result of this (16 bytes) and add it to the other context. */ - gaim_cipher_context_digest(context2, NULL, digest); + gaim_cipher_context_digest(context2, sizeof(digest), digest, NULL); /* Add for any character in the key one byte of the alternate sum. */ for (cnt = key_len; cnt > 16; cnt -= 16) @@ -120,7 +121,7 @@ (cnt & 1) != 0 ? digest : (guint8 *)key, 1); /* Create intermediate result. */ - gaim_cipher_context_digest(context1, NULL, digest); + gaim_cipher_context_digest(context1, sizeof(digest), digest, NULL); /* Now comes another weirdness. In fear of password crackers here * comes a quite long loop which just processes the output of the @@ -151,7 +152,7 @@ gaim_cipher_context_append(context2, key, key_len); /* Create intermediate result. */ - gaim_cipher_context_digest(context2, NULL, digest); + gaim_cipher_context_digest(context2, sizeof(digest), digest, NULL); } /* Now we can construct the result string. It consists of three parts. */ @@ -197,7 +198,7 @@ * inside the MD5 implementation as well. */ gaim_cipher_context_reset(context1, NULL); - gaim_cipher_context_digest(context1, NULL, digest); + gaim_cipher_context_digest(context1, sizeof(digest), digest, NULL); gaim_cipher_context_destroy(context1); gaim_cipher_context_destroy(context2);
